[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ Skip to main content
Log in

Multilayer symmetric and asymmetric technique for audiovisual cryptography

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In order to ensure the secure transmission and storage of video content, this research work provides a video encryption algorithm using symmetric and asymmetric encryption methods. The suggested strategy offers strong defense against assaults through the combination of the Affine Cipher, RSA, and XOR techniques with randomly generated keys. The algorithm first breaks the video into manageable chunks, then proceeds to use the Affine Cipher method to generate a distinct keys at random for each chunk. The RSA technique is then employed to encrypt the keys, ensuring secure transfer to the recipient. To increase the security, a new key is generated for every individual video segment using a random number generator. The suggested strategy also encrypts the video data using the XOR method, adding another degree of protection. Without a compatible key, the encrypted video data cannot be viewed thanks to the XOR algorithm. The experimental findings demonstrate that the suggested method offers strong defense against a variety of attacks, including differential, statistical, and brute-force attacks. The algorithm also exhibits excellent efficiency by being able to encrypt and decrypt video data almost instantly. Encryption and decryption only take 174.25 and 136.38 nanoseconds, respectively, per pixel. The suggested algorithm offers a reliable, effective, and safe solution for video encryption, making it appropriate for usage in a variety of applications, such as online video streaming, video conferencing, and video surveillance.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (United Kingdom)

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Algorithm 1
Algorithm 2
Algorithm 3
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19
Fig. 20
Fig. 21
Fig. 22
Fig. 23
Fig. 24
Fig. 25
Fig. 26
Fig. 27
Fig. 28
Fig. 29
Fig. 30
Fig. 31
Fig. 32
Fig. 33
Fig. 34
Fig. 35
Fig. 36
Fig. 37
Fig. 38
Fig. 39
Fig. 40
Fig. 41
Fig. 42
Fig. 43
Fig. 44
Fig. 45
Fig. 46
Fig. 47
Fig. 48
Fig. 49
Fig. 50
Fig. 51
Fig. 52
Fig. 53

Similar content being viewed by others

Data Availability

The data sets analyzed during the experimentation have been generated by the authors. The data can be shared whenever required.

References

  1. Abed S, Waleed L, Aldamkhi G, Hadi K (2021) Enhancement in data security and integrity using the minhash technique. Indonesian Journal of Electrical Engineering and Computer Science 21. https://doi.org/10.11591/ijeecs.v21.i3.pp1739-1750

  2. Albahrani EA, Alshekly TK, Lafta SH (2022) A Review on Audio Encryption Algorithms Using Chaos Maps-Based Techniques. https://doi.org/10.13052/jcsm2245-1439.1113

  3. Ali M, Baloch A, Waheed A, Zareei M, Manzoor R, Sajid H, Alanazi F (2021) A simple and secure reformation-based password scheme. IEEE Access 9. https://doi.org/10.1109/ACCESS.2020.3049052

  4. Alsaffar DM, Almutiri AS, Alqahtani B, Alamri RM, Alqahtani HF, Alqahtani NN, Alshammari GM, Ali AA (2020). Image encryp- tion based on AES and RSA algorithms. https://doi.org/10.1109/ICCAIS48893.2020.9096809

    Article  Google Scholar 

  5. Al-Zubaidie M, Zhang Z, Zhang J (2019) Ramhu: A new robust, lightweight scheme for mutual user authentication in healthcare applications. Security and Communication Networks 2019. https://doi.org/10.1155/2019/3263902

  6. Cheng H (2000) Partial encryption of compressed images and videos. IEEE Transactions on Signal Processing. https://doi.org/10.1109/78.852023

  7. Cheng L, Liu F, Yao D (2017) Enterprise Data Breach: Causes, Challenges, Prevention, and Future Directions. WIREs Data Mining Knowl Discov 5(7):e1211. https://doi.org/10.1002/widm.1211

    Article  Google Scholar 

  8. Cheng S, Wang L, Ao N, Han Q (2020) A selective video encryption scheme based on coding characteristics. Symmetry 12. https://doi.org/10.3390/sym12030332

  9. Chepuri S (2017) An RGB image encryption using RSA algorithm. International Journal of Current Trends in Engineering Research (IJCTER) 3

  10. Dhruv M, Manish J, Hartik S, Ramchandra M (2022) DieRoll: A Unique Key Generation and Encryption Technique. Journal of Applied Security Research. https://doi.org/10.1080/19361610.2022.2124589

    Article  Google Scholar 

  11. Elkamchouchi H, Salama WM, Abouelseoud Y (2020) New video encryption schemes based on chaotic maps. IET Image Processing 14. https://doi.org/10.1049/iet-ipr.2018.5250

  12. Elrefaey A, Sarhan A, El-Shennawy NM (2021) Parallel approaches to improve the speed of chaotic-maps-based encryption using GPU. Journal of Real-Time Image Processing 18. https://doi.org/10.1007/s11554-020-01064-w

  13. Farik M, Nisha S (2017) RSA public key cryptography algorithm-a review. Article in International Journal of Scientific Technology Research 6

  14. Guleria V, Mishra DC (2021) Multiple RGB image encryption algorithm with multilayers by affine hill cipher with FRDCT and Arnold transform. Fractals 29. https://doi.org/10.1142/S0218348X21501516

  15. Hosny KM, Zaki MA, Lashin NA, Fouda MM, Hamza HM (2023) Multimedia Security Using Encryption: A Survey 2023. https://doi.org/10.1109/ACCESS.2023.3287858

  16. Ighalo GI (2013) Using mono-alphabetic substitution to secure against threats and risk in information technology. IOSR Journal of Electronics and Communication Engineering. https://doi.org/10.9790/2834-0516064

    Article  Google Scholar 

  17. Kanaad D, Junaid G, Ramchandra M (2023) Security enhancement and analysis of images using a novel Sudoku-based encryption algorithm. Journal of Information and Telecommunication. https://doi.org/10.1080/24751839.2023.2183802

    Article  Google Scholar 

  18. Khlif N, Amor MB, Masmoudi N, Kammoun F (2020) A new evaluation of video encryption security with a perceptual metric. J Test Eval 48. https://doi.org/10.1520/JTE20160456

  19. Kota CM, Aissi C (2022) Implementation of the RSA algorithm and its cryptanalysis. https://doi.org/10.18260/1-2-620-38785

  20. Li X, Yu H, Zhang H, Jin X, Sun H, Liu J (2020) Video encryption based on hyperchaotic system. Multimedia Tools and Applications 79. https://doi.org/10.1007/s11042-020-09200-1

  21. Lin R, Li S (2021) An image encryption scheme based on Lorenz hyperchaotic system and RSA algorithm. Security and Communication Networks 2021. https://doi.org/10.1155/2021/5586959

  22. Liu F, Koenig H (2010). A Survey of Video Encryption Algorithms. https://doi.org/10.1016/j.cose.2009.06.004

    Article  Google Scholar 

  23. Lone MA, Qureshi S (2022) RGB image encryption based on symmetric keys using Arnold transform, 3d chaotic map, and Affine Hill cipher. Optik 260. https://doi.org/10.1016/j.ijleo.2022.168880

  24. Lone PN, Singh D, Mir UH (2021) A novel image encryption using random matrix Affine cipher and the chaotic maps. Journal of Modern Optics 68. https://doi.org/10.1080/09500340.2021.1924885

  25. Masood F, Driss M, Boulila W, Ahmad J, Rehman SU, Jan SU, Qayyum A, Buchanan WJ (2021) A lightweight chaos-based med- ical image encryption scheme using random shuffling and xor operations. Wireless Personal Communications. https://doi.org/10.1007/s11277-021-08584-z

  26. Massoudi A, Lefebvre F, Vleeschouwer CD, MacQ B, Quisquater JJ (2008) Overview on selective encryption of image and video: Challenges and perspectives. Eurasip Journal on Information Security 2008. https://doi.org/10.1155/2008/179290

  27. Nilesh AL, (2017) A review of encryption algorithms-RSA and diffie-hellman. INTERNATIONAL JOURNAL OF SCIENTIFIC TECHNOLOGY RESEARCH

  28. PD, Babu SS, Vijayalakshmi Y, (2020) Enhancement of e-commerce security through asymmetric key algorithm. Computer Communications 153. https://doi.org/10.1016/j.comcom.2020.01.033

  29. Saeed B, Majid N (2012) Image encryption using a lightweight stream encryption algorithm. Advances in Multimedia. https://doi.org/10.1155/2012/767364

  30. Setiadi, De Rosal Igantius Moses Setiadi (2021).: PSNR vs SSIM: imperceptibility quality assessment for image steganography. Multimed Tools Appl 80:8423–8444. https://doi.org/10.1007/s11042-020-10035-z

  31. Shiguo L, Zhongxuan L, Zhen R, Haila W (2006) Secure advanced video coding based on selective encryption algorithms. IEEE Transactions on Consumer Electronics. https://doi.org/10.1109/TCE.2006.1649688

  32. Simon B (2020) Document Fraud: Will Your Identity Be Secure in the Twenty-first Century?.: European Journal on Criminal Policy and Research 2020. https://doi.org/10.1007/s10610-020-09441-8

  33. Simon Singh.(2003). The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography, Queue(1) 2003. https://doi.org/10.1145/966789.966797

  34. Telem ANK, Feudjio C, Ramakrishnan B, Fotsin HB, Rajagopal K (2022) A simple image encryption based on binary image Affine transformation and zigzag process. Complexity. https://doi.org/10.1155/2022/3865820

  35. Venkatesh K, Narasimhan D (2022) Mlpd: a multilayer protection with deduplication technique to preserve audio file transmission over the public domain. Soft Computing 26. https://doi.org/10.1007/s00500-022-06801-w

  36. Xie D, Kuo CCJ (2007) Multimedia encryption with joint randomized entropy coding and rotation in partitioned bitstream. Eurasip Journal on Information Security 2007. https://doi.org/10.1155/2007/35262

  37. You L, Yang E (2020) Wang GA (2020) novel parallel image encryption algorithm based on hybrid chaotic maps with OpenCL implementation. Soft Comput 24:12413–12427. https://doi.org/10.1007/s00500-020-04683-4

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ramchandra Mangrulkar.

Ethics declarations

Conflicts of interest

The authors declare that they have no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Parekh, A., Antani, M., Suvarna, K. et al. Multilayer symmetric and asymmetric technique for audiovisual cryptography. Multimed Tools Appl 83, 31465–31503 (2024). https://doi.org/10.1007/s11042-023-16401-x

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-023-16401-x

Keywords

Navigation